BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
/in General NewsThe threat actors behind the VexTrio Viper Traffic Distribution Service (TDS) have been linked to other TDS services like Help TDS and Disposable TDS, indicating that the sophisticated cybercriminal operation is a sprawling enterprise of its own that’s designed to distribute malicious content.
“VexTrio is a group of malicious adtech companies that distribute scams and harmful software via
The Hacker News – Read More
How to delete your 23andMe data ASAP – and why you should
/in General NewsSince 23andMe filed for bankruptcy and a pharmaceutical company won the bid to acquire it, about 15% of its customers have requested their data be deleted. Here’s how you can, too.
Latest stories for ZDNET in Security – Read More
Social Media Is Now a DIY Alert System for ICE Raids
/in General NewsThe undocumented migrant community in the United States is using social networks and other digital platforms to send alerts about raids and the presence of immigration agents around the US.
Security Latest – Read More
Apple fixes new iPhone zero-day bug used in Paragon spyware hacks
/in General NewsThe iPhone maker quietly updated a February security advisory to publicize a flaw that was used to hack at least two journalists in Europe.
Security News | TechCrunch – Read More
Belarusian hackers taunt Kaspersky over report detailing their attacks
/in General NewsA recent Kaspersky report offers a rare glimpse into the alleged arsenal of politically motivated hackers waging a digital war against authoritarian regimes in Russia and Belarus.
The Record from Recorded Future News – Read More
Paragon ‘Graphite’ Spyware Linked to Zero-Click Hacks on Newest iPhones
/in General NewsCitizen Lab publishes forensic proof that spyware maker Paragon can compromise up-to-date iPhones. Journalists in Europe among victims.
The post Paragon ‘Graphite’ Spyware Linked to Zero-Click Hacks on Newest iPhones appeared first on SecurityWeek.
SecurityWeek – Read More
New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
/in General NewsCybersecurity researchers have discovered a novel attack technique called TokenBreak that can be used to bypass a large language model’s (LLM) safety and content moderation guardrails with just a single character change.
“The TokenBreak attack targets a text classification model’s tokenization strategy to induce false negatives, leaving end targets vulnerable to attacks that the implemented
The Hacker News – Read More
The AI Arms Race: Deepfake Generation vs. Detection
/in General NewsAI-generated voice deepfakes have crossed the uncanny valley, fueling a surge in fraud that outpaces traditional security measures. Detection technology is racing to keep up.
The post The AI Arms Race: Deepfake Generation vs. Detection appeared first on SecurityWeek.
SecurityWeek – Read More
The $200,000 Zoom call
/in General NewsA crypto CEO shared his screen. What happened next unraveled his digital life.
The Record from Recorded Future News – Read More
AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
/in General NewsAI is changing everything — from how we code, to how we sell, to how we secure. But while most conversations focus on what AI can do, this one focuses on what AI can break — if you’re not paying attention.
Behind every AI agent, chatbot, or automation script lies a growing number of non-human identities — API keys, service accounts, OAuth tokens — silently operating in the background.
And here’s
The Hacker News – Read More